Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 235970, 14 pages
Research Article

Real-Time Safety Risk Assessment Based on a Real-Time Location System for Hydropower Construction Sites

1State Key Laboratory of Hydroscience and Engineering, Tsinghua University, Haidian, Beijing 100084, China
2China Yangtze Three Gorges Group Corporation, Beijing 100038, China

Received 13 April 2014; Revised 18 June 2014; Accepted 24 June 2014; Published 9 July 2014

Academic Editor: Xiao-Wei Ye

Copyright © 2014 Hanchen Jiang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


The concern for workers’ safety in construction industry is reflected in many studies focusing on static safety risk identification and assessment. However, studies on real-time safety risk assessment aimed at reducing uncertainty and supporting quick response are rare. A method for real-time safety risk assessment (RTSRA) to implement a dynamic evaluation of worker safety states on construction site has been proposed in this paper. The method provides construction managers who are in charge of safety with more abundant information to reduce the uncertainty of the site. A quantitative calculation formula, integrating the influence of static and dynamic hazards and that of safety supervisors, is established to link the safety risk of workers with the locations of on-site assets. By employing the hidden Markov model (HMM), the RTSRA provides a mechanism for processing location data provided by the real-time location system (RTLS) and analyzing the probability distributions of different states in terms of false positives and negatives. Simulation analysis demonstrated the logic of the proposed method and how it works. Application case shows that the proposed RTSRA is both feasible and effective in managing construction project safety concerns.

1. Introduction

The construction industry is one of the most dangerous industrial sectors worldwide [1, 2]. The working environment and the work tasks themselves are complex. The number of workers on site generally is large. Heavy machinery and a multitude of pipes, materials, and cables are always in evidence. In addition, sites are frequently not “tidy”; it is not surprising that both the fatality and badly injured accident rates on construction site are higher than those in other areas of work [3, 4]. According to the Bureau of Labor statistics in the United States [5], 4253 construction workers died on sites between 2008 and 2012. In China, the official statistics show that, in the one year, 2007, construction industrial accidents caused the deaths of 2722 workers [6]. Hydropower projects, in particular, have been found to have tougher working conditions than other construction sites and safety management of such construction projects is more difficult than that in any other segment of the industry [7]. Currently, China has been continuously developing large hydropower projects on main rivers, such as the Jinsha, Nujiang, and Yarlung Tsangpo River, investing large financial sums and manpower resources [8, 9]. Hence, without the improvement of the safety management, culture of the construction industry and the implementation of the national policy, which is “safety first and prevention oriented” [10] and which is also a vital management goal of hydropower enterprises in China, will not be achieved and it is unlikely that the accident rate on construction sites will decrease.

Recent studies related to construction safety management have asserted that most accidents on sites could have been reduced and some even eliminated, if there existed an effective and consistent safety management process of identification, planning, education/training, and inspection [11]. Safety risk assessment is very important for developing a safety management system [1214]. Numerous risk assessment methods, such as safety checklists, fault tree analysis (FTA), and likelihood exposure consequences (LEC), have been developed to assist construction engineers and project managers in safety risk management [15]. The LEC method is widely used in casualty risk assessment in industrial construction [16]. Risk is considered to be the product of three factors: risk likelihood/probability (), risk exposure frequency (), and consequences (). Casanovas et al. [17] presented a risk index which included 19 construction work activities and used the product of consequence and probability to obtain the risk value of each activity. In addition, accident statistics, event tree analysis, and failure mode and effects analysis are also applied in safety management in the construction industry [18]. All the above methods, however, produce qualitative or semiqualitative analysis results. Such results cannot be considered reliable. For example, all of the three factors of LEC method are based on the subjective evaluation of experts. Differences in the experience of different experts may lead to different evaluation results of the same risk [16]. In addition, most of these methods are passive approaches, heavily dependent on historical data and lacking timeliness [17, 19]. As a consequence, these methods, although producing results of interest and for guidance, cannot be used to quantitatively assess the current status of safety performance and the risk value.

In order to operate a safety risk assessment procedure accurately, some quantitative methods based on probability theory and fuzzy sets theory are proposed. Using machine learning algorithms, Matías et al. [20] performed the identification of hazardous sources on construction sites and the subsequent determination of the relationship between the accident and the cause. Matías et al. [21] designed a Bayesian network (BN) based method designed to analyze workplace accidents caused by falls from heights. Leu and Chang [22] successfully combined probabilistic methods with traditional methods (event tree analysis), enabling the setting up of a complete logic model to build a quantitative risk assessment method for construction projects. Regarding fuzzy set theory, Lee and Halpin [23] proposed a quantitative approach based on fuzzy logic for measuring the effects of accidents. Nunes [24] developed an expert system aimed at supporting risk analysis based on fuzzy sets. Azadeh et al. [25] developed a fuzzy expert system for performance assessment of health, safety, environment, and ergonomic system factors in a gas refinery with the objectives of the reduction of human error, creation of expert knowledge, and interpretation of large amounts of vague data. These quantitative methods based on probability and fuzzy sets theory offer relatively accurate evaluation results compared to those of the traditional methods and have been implemented in practical projects. Nevertheless, none of the above methods have been able to adapt to the dynamic context of construction projects, particularly those complex activities which contribute greatly to the safety risk of on-site workers. In addition, such methods cannot provide real-time information about safety states, which is a necessity to enable timely response and rescue.

Recently, extensive studies of real-time risk assessment have been carried out. An example is provided by the hidden Markov model (HMM) which is effective in many temporal and real-time pattern recognition applications, such as human action recognition [26, 27], speech recognition [28], and prediction of unknown events [29, 30]. Real-time risk assessment methods based on the HMM focus on the field of network security. These methods use the HMM to process the observation symbol sequences of invasions and attacks to determine the real-time safety risk of a network [3133]. In principle, the HMM based risk assessment method is accessible, but real-time safety risk assessment studies in construction management have not been found in the literature. The main reason for this could be the lack of availability of on-site asset real-time location information.

As a consequence, some studies have focused on the development of intelligent control systems [3437], adopting advanced communication technologies [38, 39], real-time location [40, 41], and intelligent algorithms as the means of developing new automated management and monitoring systems [4244]. However, these particular studies concentrate more strongly on technical performances, such as accuracy of positioning and optimization of communication frequency, while significant features such as safety management functions are not directly targeted. Geofencing which deals with the automatic detection of the entrance of individuals into dangerous preset forbidden zones is the basic safety management model revealed in the literature [39, 40]. But the simple trigger logic of the geofencing can only offer managers poor binary information concerning on-site workers’ behaviour (either within the forbidden zones or not in the forbidden zones) and may lead to frequent false positives. As a consequence, the development of an integrated method to perform real-time safety risk assessment of on-site workers based on probability concepts is necessary. The workers’ real-time location data should be provided by real-time location technologies. Overall, the development of automatic monitoring technology, especially the real-time location technology for individuals, provides great feasibility for implementation of real-time safety risk assessment. And the real-time location system for personnel and the monitoring system for structure constitute a complete solution for health and safety management in industrial construction.

In this study, GPS and Wi-Fi locating technology were chosen as the fundamental tracking tools. HMM was used as the risk assessment algorithm in constructing a RTSRA method for the safety management of large hydropower construction projects. The rest of this paper is organized as follows. Section 2 describes the construction of an assessment framework, including that of the real-time tracking system and the HMM modelling process. In Section 3, a simulation analysis is carried out on safety risk assessment process. Section 4 gives a preliminary application case of a dam construction site.

2. Risk Assessment Framework of RTSRA

Figure 1 shows the RTSRA logic diagram. The construction site is the environment in which the safety risk assessment is conducted. On-site assets affecting the safety risk are catalogued into the three groups: workers, hazards including dynamic and static hazards, and safety supervisors. By employing the RTLS, site assets location data are collected. Relative position relationships, in the form of a time series, between workers and hazards as well as for safety supervisors are obtained by processing and analysing the location data. The HMM is used to find the most likely probability distribution of each monitored worker’s states, followed by obtaining the real-time safety risk for each worker.

Figure 1: Logic of the real-time safety assessment method.

RTSRA, differing significantly as regards assessment objects found in earlier studies, focuses on specific worker real-time risks rather than risks of general on-site activities. Thus, RTSRA can be classified as a Human-Centered method [45]. Safety risk assessment performs as a vital potential precursor to a tool to serve on-site workers, while the Human-Centered method of RTSRA has a more direct objective in which it gives an integrated assessment of risks associated with various hazards on construction site.

On site workers carry smart phones as mobile targets implementing the provision of monitoring and communication enabled by a customized Android App. Thus, RTSRA not only is able to provide worker real-time safety risks information for managers but also can send warning or “alert” short messages to workers and site supervisors. The RTSRA enables computing to be bidirectional and ubiquitous by utilizing state-of-the-art computer and communication technology. Based on the relative positions between workers and hazards, different safety states are defined. Figure 2 gives an example of safety states definition associated with a crane. The HMM calculates the probabilities of different safety states for a worker. The degrees of severities of the different states are obtained from a knowledge base subsystem which extensively explores historical data and expert assessments. The real-time risk for a specific worker at time is thus quantified by the following equation [33]: where is the probability that the worker is in safety state associated with hazard at time , is the cost value (severity) of state associated with hazard , is the number of hazards, and is the number of safety states associated with hazard .

Figure 2: Definition of safety states associated with a crane.
2.1. Real-Time Location System

This study involved an integrated RTLS [8, 46], which tracked worker and asset locations using GPS and Wi-Fi locating technology. The RTLS framework is divided into the three layers (Figure 3), such as a physical layer where data acquisition and transmission are performed, a middleware layer where data storage is organized and all the location data is processed using a calculating engine, and an application layer providing an interface with end user by various means such as the WEB and mobile phone apps.

Figure 3: Block diagram of the real-time location system.

The physical layer is the infrastructure required to gather location data. This is composed of smart phones, Wi-Fi router, 3G data network, and optical network. The smart phone works as an RTLS agent with built-in GPS and Wi-Fi modules and has the customized app installed on it. Its function is to receive signals, including GPS signals and Wi-Fi signals, and to upload these digitalized data to the server at fixed time intervals and to calculate current locations using the trilateration algorithm [38]. The network infrastructure includes 3G base stations and a central network for data communication. Wi-Fi access points (APs) are provided as reference points in those indoor areas where GPS signals are not available and GPS infrastructure was used for outdoor positioning. The middleware layer consists of several servers and software systems, which store and retrieve location data, matches and updates the locations on the construction site map, calculates and adjusts location data, and performs other management functions such as data maintenance, load balancing, and system log management. The application layer consists of a series of human machine interfaces (HMIs) for end user. Those compatible display terminals include multimedia dispatchers, personal computers, and portable devices such as smart phones and tablet computers. The main function of this layer is to provide engineers and project managers with visual vision including the real-time trajectories of workers on site, information on work context awareness, and real-time safety risk assessment.

The users of the system can be divided into the two groups of on-site users and off-site users. They access different software as their needs are different. On-site users include workers, site supervisors, and machinery. The software is an Android App which controls the GPS module and Wi-Fi module of the smart phones. GPS is used when users are outdoors and Wi-Fi when users are in indoor places such as tunnels. Off-site users include engineers, project managers, and researchers. The main application for off-site users is a web-based software system allowing access to any authenticated user with an internet access, no matter where they are. The web page provides users with a view of the real-time locations of the on-site assets. The historical trajectories are also available for ad hoc queries. These functions assist engineers and project managers to be aware of the situation on site very conveniently. Moreover, on top of the WEB GIS system, for safety management purposes, the identification and classification of hazards and real-time worker risk assessments are implemented. Thus, a knowledge-based system is created in which system parameters, threshold values, and rules are stored and organized.

2.2. Measurable Factors

Unsafe worker activities are direct causes of accidents. Different unsafe activities are usually associated with specific hazards. It has been concluded by Casanovas et al. [17] that there are 19 health and safety risks found in construction work associated with different activities. According to hazard kinetic characteristics, these risks can be divided into dynamic and static groups (Table 1).

Table 1: Dynamic and static hazards and their associated activities on construction sites.

Most dynamic hazards on the construction site are caused by vehicles, machinery, and risky tools. A static hazard and its affected area remain unchanged for a relatively long period. These latter hazards consist of elevation changes, hazardous installations, and other dangerous zones. For both dynamic and static hazards, the critical measurable factor is the distance between the workers and hazards [17]. Accidents are more likely to happen, if workers are close to hazards. A dissimilarity is that the position of a static hazard is fixed while a dynamic hazard is always moving. In consequence, in addition to the tracking of workers, dynamic hazards must also be monitored by the RTLS in order to make valid safety risk assessments.

Another critical factor is the presence of safety supervisors. They are responsible for safety management and possess specialized safety knowledge [47]. Effective safety supervision improves the safety performance of workers. The safety supervisor must be in such a position that he can have a positive impact on a worker behaviour [48]. The distance between worker and safety supervisor can be obtained from the RTLS and hence is another measurable factor. Monitor states are compared with safety states in assessing the effectiveness of supervision, as shown in Figure 4. So far, the monitored objects factored into the assessment model include workers, safety supervisors, and dynamic hazards. The locations of static hazards are determined and updated manually. Figure 5 presents these monitored objects associated with the safety risk assessment in a typical hydropower construction site.

Figure 4: Definition of monitor states with safety supervisor.
Figure 5: Monitored objects in terms of safety risk assessment on a typical hydropower construction site.

Considering the positive impacts due to the presence of safety supervisors, a reduction factor is added to (1), as follows: where is the reduction factor associated with the presence of a safety supervisor near worker at time . Other components of (2) have the same meaning as in (1). is derived by the following equation: where is the probability that the worker is in monitor state at time . is the reduction in value of the monitor state and is determined using historical data or by experts.

Comparing (1), (2), and (3), it can be concluded that the calculation of is of the same form as a single hazard risk analysis. The key risk assessment process is application of the algorithm determining the probability distributions of safety states and monitor states of a worker. Section 2.3 describes how to calculate real-time safety state probability distribution associated with a single hazard on the basis of the hidden Markov model.

2.3. Modeling Workers as Hidden Markov Model

A HMM is a statistical Markov model in which the system being modeled is assumed to be a Markov process with hidden states [49]. The hidden states are not directly visible, but output dependent on the hidden state is visible. Each hidden state has a probability over the possible out symbol. Hence, the sequence of observation symbols generated by an HMM gives some information about the sequence of hidden states.

To be able to perform real-time risk assessment on a construction site, an RTLS must exist. Positions of workers, hazards, and safety supervisors are all known. Let be the set of workers monitored by the RTLS. To describe the safety state of each worker, discrete-time Markov chains are used. In the simplest case, consider that there is only one hazard on the site. Assume that each worker can be in one of safety states with that only hazard. And the safety states are denoted as . The safety state of a worker changes over time between the states in . The sequence of states through which the worker moves is denoted as , where is the safety state at time . For the purpose of safety risk assessment, it is assumed that the safety state space consists of the three states, normal (), dangerous (), and very dangerous (); that is, . State means safe working and is not subject to any potential safety risk. As a worker gets closer to a hazard, his safety state will move to . A worker in state is subject to an approaching risk, possibly affecting his safety related behaviour. Finally, a worker enters state if he is within the risk’s hazardous radius. A worker in state is assumed to be in great danger of serious harm. But in fact, the real safety state of a worker is unknown. It can only be implied by the observation symbol.

The observed positions and relative position relationships are provided by the RTLS. But due to the measurement error of GPS and Wi-Fi locating, there is no one-to-one correspondence relationship between real state and observation symbol. An observation symbol can consist of any of the symbol spaces . These symbols may be used to represent different types of position relationships between workers and hazards, such as very close, close, normal, and far away. The sequence of observation symbols that the system receives is denoted as , where is the observation symbol received at time . Based on the sequence of observation symbols, the system performs risk assessment dynamically.

The transition between worker safety states can be represented by a HMM, defined by , where is the state transition probability distribution matrix for worker , where , , . Hence, represents the probability that worker will transfer into state , given that his current state is . In order to estimate the value of for real working conditions, either accident statistical data, known industrial standards, or the subjective opinion of experts must be studied. Machine learning algorithms may be implemented to provide better estimates of over time for the type of site in question. is the observation symbol probability distribution matrix for worker in state , whose elements are , , . In the model, the element in represents the probability that the observation symbol will be represented by the system at time , given that the worker is in state at time . therefore indicates system false-positive and false-negative effects on the safety risk assessments. is the initial state distribution for the worker. Hence, is the probability that was the initial state of the worker.

As only one hazard is taken into account in the analysis above, (1) can be written as where is the risk for worker at time , is the probability that the worker is in safety state , and is the cost value associated with state .

Based on the principle of HMM, given an observation symbol , and HMM , the system can update the state probability distribution of any worker. The pseudocode updating state probability distribution is as in Pseudocode 1.

Pseudocode 1

3. Simulation Analysis

In order to illustrate the risk assessment method, a simulated analysis was performed. The scope included a worker, a crane (dynamic hazard), a critical edge (static hazard), and a safety supervisor. Positions of the worker, the crane, and the safety supervisor were provided by the RTLS. The position of the critical edge is known and constant. A server regularly received the position data and calculated the relative position relationships between the worker and other assets. The observation symbols indicating safety states and monitoring states were then obtained. For each new symbol, the application used the algorithm in Section 2.3 to update the worker safety states and probabilities and calculated the corresponding risk values. The safety risks associated with the crane and the critical edge and the reduction factor to be applied associated with the safety supervisor were also calculated. Estimating the matrices and , as well as the cost value and the reduction factor associated with different states, is a nontrivial task outside the scope of this study. The parameters in this case study were chosen qualitatively and only for the purpose of illustration.

3.1. Dynamic and Static Hazard Risk

The safety risk associated with the dynamic hazard was first calculated, based on an observation symbol sequence representing the relative positions of workers and the crane. 20 samples were collected using the RTLS and processed by the server. The set was used to describe the worker safety state. The observation symbols set is defined as , where the symbol indicates state , and so forth. The HMM was used, where Based on the accuracy of GPS and Wi-Fi location technology, the false-positive and false-negative rates were assumed to be relatively high. Hence, values of , , , , , and are not less than 0.2. The cost value is defined as . Given the observation symbol sequence , shown on the -axis of Figure 6(a), the dynamic hazard risk is obtained and shown in Figure 6(a).

Figure 6: Simulated calculation results illustrating worker safety risk.

The static hazard has the same safety state set and observation symbol set as the dynamic hazard. Taking into account the different damage mechanism and different monitored objects, a new HMM was created to illustrate static hazard risk assessment: The main difference is embodied in the fact that the static hazard has lower false-positive and false-negative rates. This is because the static hazard has a fixed and known position which leads to greater accuracy in determining the safety state according to the observation symbol. The cost value is defined as . Figure 6(b) shows the assessment of the static hazard risk using the HMM . The observation symbol sequence for the static hazard is not identical to that in Section 3.1, as these are two different kinds of safety state.

3.2. Reduction Factor

The reduction factor associated with the presence of the safety supervisor was calculated using the same method. The set was used to describe the worker monitor state. (controlled) means that worker behavior was influenced by the supervisor. (affected) indicates a weaker influence than . (missed) means that the worker was not affected by the supervisor. Correspondingly, the observation symbols set is defined as , and the HMM was used, where

The reduction values for the different monitor states were set as . Given the observation symbol sequence shown on the -axis of Figure 6(c), the reduction factors were obtained from that figure.

3.3. Integrated Result

Synthesizing the dynamic hazard risk, the static hazard risk, and the reduction factor, the integrated real-time risk was calculated using (2). The result is shown in Figure 6(d).

To gain an intuitive understanding of the integrated safety risk, the range of the risk values was divided into the 5 levels: low, manageable, elevated, high, and severe, referring to The Code of Construction Project Management, and other literatures [8, 50, 51]. A color-coded metaphor was applied to indicate the five levels of risk severity in this research. From high risk to low, the colors were red, orange, yellow, blue, and green. Table 2 gives the corresponding relationships.

Table 2: Qualitative and numerical ratings for the risk value of a worker.

The safety risk ratings provide the basis for the speed of response. If the risk reaches a certain level, the safety management system may trigger a response to control the risk level. The response may relate to an individual worker or be related to region of the site if there is high risk in a particular zone. An individual-oriented response may be a warning message issued to the workers, or the dispatching of a group of safety supervisors. Examples of a zone-wide response may be a live broadcast alert, a pause of work in the related zone, or even the withdrawal of the workers. These measures, requiring judgment, have to be controlled by management personnel hence provision of the visualization interface and colour-coded risk indicator is important.

4. On-Site Application

4.1. Setup of the Real-Time Tracking System

The proposed safety risk assessment method was applied to the construction management of the Xiluodu hydropower station, which is the second largest hydropower project in the world generating 13.86 million kW of power after completion [52, 53]. The dam is located on the Jinshajiang River, in Leibo county of Sichuan Province. This high arch dam with a maximum height of 285.5 m is being built by pouring 6.5 million cubic meters of concrete. Thousands of workers are employed and exposed to a complicated working environment. Safety management is a critical concern of the contractors, the supervision company, and the owner. As a result, implementation of the proposed safety control method, especially the establishment of the RTLS, is of great significance. In 2013, infrastructure for GPS and Wi-Fi location facilities was deployed on the dam crest and in all six main tunnels [8].

4.2. Site Data Collection

Site data was collected during the pouring of concrete in number 22 dam monolith. This data consisted of four 20-minute asset trajectories and of a safety supervisor, a concrete vibrator (Figure 7(a)), and a concrete paver (Figure 7(b)), respectively. As the working condition was “outdoors,” the data was collected by GPS model in the smart phone carried by the on-site assets. The geographic coordinates of the trajectories are shown in Table 3. Data was sampled at 10-second intervals. The location information of critical edges in the monolith was obtained from the GIS system for the project. The main dangers to safety came from the two heavy machines (dynamic hazards) and critical edges (static hazards). The number 22 dam monolith plan is shown in Figure 7(c). Both dynamic hazards and static hazards are indicated by the red slashes.

Table 3: Records of the trajectories.
Figure 7: Concrete pouring hazards in number 22 dam monolith.

The procedure cycle of the worker is detailed as follows.

Step 1. Move to the concrete pouring area from the edge of the dam monolith.

Step 2. Catch the hanging cage delivered by the cable crane and open the cage to release the concrete.

Step 3. Move back to the edges and wait for the concrete paver and the concrete vibrator to complete their work on the fresh concrete.

Step 4. Pave and vibrate the concrete at the edges and corners using manual labour.

Step 5. Wait for the hanging cage to arrive again at the pouring area.

4.3. Results and Discussions

The HMM parameters , , and used in this calculation were the same as those of the simulation in Section 3 as well as the safety state sets and the observation symbol sets. The cost and supervisor reduction values and the distances involved related to the different states are given in Table 4. The worker safety risk assessment results in the 20 minutes concerned are shown in Figure 8. Variation for each risk, the reduction factor, and the integrated risk are presented in different colors.

Table 4: Parameters for the safety risk assessment.
Figure 8: Real-time safety risks to a worker situated in the pouring area for a 20-minute period.

From Figure 8, periodic changes occur in worker safety risks, as the working procedure is cyclical. The cycle time is controlled by the cable crane cycle of about 5 minutes in delivering the concrete bucket. The most obvious periodic risk is associated with the critical edge. Five peaks in the orange line are evident in Figure 8, as workers approached and entered the critical edge zone on 5 occasions. Focusing on the yellow and blue lines, risks associated with the two heavy machines also clearly fluctuated. That was because the paving and vibrating procedures caused the machines to intermittently approach the workers. The green line indicating the reduction factor resulting from the presence of the safety supervisor remains constant, which means that the safety supervisor was strictly monitoring the workers throughout the task. The integrated risk is represented by the black line. Peak values of the integrated risk appear at 2′50′′, 5′30′′, 8′40′′, 11′00′′, 15′30′′, and 19′10′′. At those moments, the workers walked back to the critical edge and manually paved or vibrated the concrete, while the machines were busy with the fresh concrete which might approach the workers from time to time. There was, therefore, the superposition of several risks. From field data based calculations, it can be concluded that the safety supervisor as well as the worker should pay particular attention when manual paving and vibrating are occurring at the critical edges.

In conclusion, the on-site application results are in line with the actual site situation. Dangerous states caused by worker behavior, the hazards on-site, and the effect of safety supervisor presence can be embodied in the risk value.

5. Conclusions

A RTSRA method has been presented in this paper. The method based on the HMM processes the location data obtained from the RTLS and gives the engineers and project managers real-time safety risk assessments applying to on-site workers. The following conclusions can be drawn.(1)The RTSRA implements a quantitative, Human-Centered, and real-time safety risk assessment. Factors related to the real-time safety risk of an on-site worker have been classified and quantified. The real-time safety risk values and reduction factors are obtained using a proposed reliable formula for quantifying risks. Based on the HMM, the RTSRA gives the real-time probability distributions of different safety states/monitor states and subsequent safety risk values.(2)When combined with the real-time location system, the RTSRA builds a logical relationship between safety risk and the locations of on-site assets. The proposed method leverages the massive data produced by the RTLS to provide more abundant site information. Such information enables project managers and engineers to anticipate the locality and potential occurrence of safety risk and contributes to more effective computerized decision processes.(3)The on-site application shows that the proposed method is reliable and effective for real-time safety risk assessment. The logic and the function of the proposed novel method fulfill the goals of safety management.

The RTSRA method was broadly applied to the safety management of a single concrete poured on the Xiluodu dam hydropower construction site. Further study, however, is necessary to focus on case statistics and optimization of the HMM parameters concerned in improving the accuracy and effectiveness of the safety risk assessment method proposed.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.


This research work was supported by the National Natural Science Foundation of China (nos. 11272178 and 51179086), the National Basic Research Program of China (973 Program) Grant no. 2011CB013503, and Tsinghua University Initiative Scientific Research Program. The authors are very grateful to the China Three Gorges Corporation for allowing access to one of its construction sites.


  1. R. Y. Sunindijo and P. X. W. Zou, “Conceptualizing safety management in construction projects,” Journal of Construction Engineering and Management, vol. 139, no. 9, pp. 1144–1153, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. G. E. Aguilar and K. N. Hewage, “IT based system for construction safety management and monitoring: C-RTICS2,” Automation in Construction, vol. 35, pp. 217–228, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. P. Lin, Q. Li, Q. Fan, and X. Gao, “Real-time monitoring system for workers behavior analysis on a large-dam construction site,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 509423, 10 pages, 2013. View at Publisher · View at Google Scholar
  4. G. M. Waehrer, X. S. Dong, T. Miller, E. Haile, and Y. Men, “Costs of occupational injuries in construction in the United States,” Accident Analysis & Prevention, vol. 39, no. 6, pp. 1258–1266, 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. U.S. Bureau of Labor Statistics, Fatal occupational injuries by industry and event or exposure, All United States, 2014,
  6. M. Zhang and D. Fang, “Cognitive causes of construction worker's unsafe behaviors and management measures,” China Civil Engineering Journal, vol. 45, no. 2, pp. 297–305, 2012. View at Google Scholar · View at Scopus
  7. P. Lin, Q. B. Li, Q. Fan, X. Gao, and S. Hu, “A real-time location-based services system using WiFi fingerprinting algorithm for safety risk assessment of workers in tunnels,” Mathematical Problems in Engineering, vol. 2014, Article ID 371456, 10 pages, 2014. View at Publisher · View at Google Scholar
  8. P. Lin, R. Wang, S. Kang, H. Zhang, and W. Zhou, “Key problems of foundation failure, reinforcement and stability for superhigh arch dams,” Chinese Journal of Rock Mechanics and Engineering, vol. 30, no. 10, pp. 1945–1958, 2011. View at Google Scholar · View at Scopus
  9. P. Lin, B. Huang, Q. B. Li, and R. K. Wang, “Hazards and seismic reinforcement analysis for typical large dams following the Wenchuan earthquake,” Engineering Geology, 2014. View at Publisher · View at Google Scholar
  10. M. Zhong, T. Liu, Y. Deng, C. Shi, T. Fu, and X. Hu, “Safety evaluation: important safeguard of work safety for enterprises in China,” Journal of Loss Prevention in the Process Industries, vol. 19, no. 6, pp. 762–768, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Park and H. Kim, “A framework for construction safety management and visualization system,” Automation in Construction, vol. 33, pp. 95–103, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. I. W. H. Fung, V. W. Y. Tam, T. Y. Lo, and L. L. H. Lu, “Developing a risk assessment model for construction safety,” International Journal of Project Management, vol. 28, no. 6, pp. 593–600, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Jung, S. Kang, Y. Kim, and C. Park, “Assessment of safety management information systems for general contractors,” Safety Science, vol. 46, no. 4, pp. 661–674, 2008. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Pinto, I. L. Nunes, and R. A. Ribeiro, “Occupational risk assessment in construction industry—overview and reflection,” Safety Science, vol. 49, no. 5, pp. 616–624, 2011. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Aminbakhsh, M. Gunduz, and R. Sonmez, “Safety risk assessment using analytic hierarchy process (AHP) during planning and budgeting of construction projects,” Journal of Safety Research, vol. 46, pp. 99–105, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Zhu, X. Fu, K. Li, X. Shi, and J. Liu, “Application of improved LEC method to hazard evaluation in hydroelectric project construction,” Journal of Safety Science and Technology, vol. 5, no. 4, pp. 51–54, 2009. View at Google Scholar
  17. M. M. Casanovas, J. Armengou, and G. Ramos, “Occupational risk index for assessment of risk in construction work by activity,” Journal of Construction Engineering and Management, vol. 140, no. 1, 2013. View at Publisher · View at Google Scholar
  18. R. L. Brauer, Safety and Health for Engineers, John Wiley & Sons, 2006.
  19. J. Chen and Y. Yang, “A predictive risk index for safety performance in process industries,” Journal of Loss Prevention in the Process Industries, vol. 17, no. 3, pp. 233–242, 2004. View at Publisher · View at Google Scholar · View at Scopus
  20. J. M. Matías, T. Rivas, C. Ordóñez, and J. Taboada, “Assessing the environmental impact of slate quarrying using bayesian networks and GIS,” in Proceedings of the International Conference on Computational Methods in Science and Engineering (ICCMSE '07), vol. 963, pp. 1285–1288, Las Palmas, Spain, December 2007.
  21. J. M. Matías, T. Rivas, J. E. Matías, and J. Taboada, “A machine learning methodology for the analysis of workplace accidents,” International Journal of Computer Mathematics, vol. 85, no. 3-4, pp. 559–578, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. S.-S. Leu and C.-M. Chang, “Bayesian-network-based safety risk assessment for steel construction projects,” Accident Analysis & Prevention, vol. 54, pp. 122–133, 2013. View at Publisher · View at Google Scholar · View at Scopus
  23. S. Lee and D. W. Halpin, “Predictive tool for estimating accident risk,” Journal of Construction Engineering and Management, vol. 129, no. 4, pp. 431–436, 2003. View at Publisher · View at Google Scholar · View at Scopus
  24. I. L. Nunes, “Fuzzy multicriteria model for ergonomic workplace analysis and risk analysis,” in Proceedings of the 5th International Conference: Computer-Aided Ergonomics and Safety (CAES '05), pp. 25–28, Kosice, Slovakia, May 2005.
  25. A. Azadeh, I. M. Fam, M. Khoshnoud, and M. Nikafrouz, “Design and implementation of a fuzzy expert system for performance assessment of an integrated health, safety, environment (HSE) and ergonomics system: the case of a gas refinery,” Information Sciences, vol. 178, no. 22, pp. 4280–4300, 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. T. Starner and A. Pentland, “Real-time american sign language recognition from video using hidden markov models,” in Motion-Based Recognition, vol. 9 of Computational Imaging and Vision, pp. 227–243, Springer, Dordrecht, The Netherlands, 1997. View at Publisher · View at Google Scholar
  27. J. Yamato, O. Jun, and I. Kenichiro, “Recognizing human action in time-sequential images using hidden markov model,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '92), pp. 379–385, Champaign, Ill, USA, June 1992.
  28. P. Singh, N. Kapur, and P. Kaur, “Speech recognition with hidden markov model: a review,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 3, pp. 400–403, 2012. View at Google Scholar
  29. A. Krogh, B. Larsson, G. von Heijne, and E. L. L. Sonnhammer, “Predicting transmembrane protein topology with a hidden Markov model: application to complete genomes,” Journal of Molecular Biology, vol. 305, no. 3, pp. 567–580, 2001. View at Publisher · View at Google Scholar · View at Scopus
  30. E. L. L. Sonnhammer, G. von Heijne, and A. Krogh, “A hidden Markov model for predicting transmembrane helices in protein sequences,” Proceedings of the International Conference on Intelligent Systems for Molecular Biology (ISMB '98), vol. 6, pp. 175–182, 1998. View at Google Scholar · View at Scopus
  31. F. Gao, J. Sun, and Z. Wei, “The prediction role of hidden markov model in intrusion detection,” in Proceedings of the Canadian Conference on Electrical and Computer Engineering (IEEE CCECE '03), vol. 2, pp. 893–896, Montreal , Canada, May 2003. View at Scopus
  32. K. Haslum, A. Abraham, and S. Knapskog, “DIPS: a framework for distributed intrusion prediction and prevention using hidden Markov models and online fuzzy risk assessment,” in Proceedings of the 3rd Internationl Symposium on Information Assurance and Security (IAS '07), pp. 183–188, Sydney , Australia, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  33. A. Årnes, K. Sallhammar, K. Haslum, T. Brekne, M. E. G. Moe, and S. J. Knapskog, “Real-time risk assessment with network sensors and intrusion detection systems,” in Computational Intelligence and Security, pp. 388–397, Springer, Berlin, Germany, 2005. View at Google Scholar
  34. P. Lin, Q. Li, and P. Y. Jia, “A real-time temperature data transmission approach for intelligent cooling control of mass concrete,” Mathematical Problems in Engineering, vol. 2014, Article ID 514606, 10 pages, 2014. View at Publisher · View at Google Scholar
  35. T. H. Yi, H. Li, and M. Gu, “Optimal sensor placement for structural health monitoring based on multiple optimization strategies,” The Structural Design of Tall and Special Buildings, vol. 20, no. 7, pp. 881–900, 2011. View at Publisher · View at Google Scholar · View at Scopus
  36. P. Lin, Q. Li, and H. Hu, “A flexible network structure for temperature monitoring of a super high arch dam,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 917849, 10 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  37. P. Lin, Q. Li, S. Zhou, and Y. Hu, “Intelligent cooling control method and system for mass concrete,” Journal of Hydraulic Engineering, vol. 44, no. 8, pp. 950–957, 2013. View at Google Scholar
  38. T. H. Yi, H. N. Li, and M. Gu, “Recent research and applications of GPS-based monitoring technology for high-rise structures,” Structural Control and Health Monitoring, vol. 20, no. 5, pp. 649–670, 2013. View at Publisher · View at Google Scholar · View at Scopus
  39. A. Carbonari, A. Giretti, and B. Naticchia, “A proactive system for real-time safety management in construction sites,” Automation in Construction, vol. 20, no. 6, pp. 686–698, 2011. View at Publisher · View at Google Scholar · View at Scopus
  40. B. Naticchia, M. Vaccarini, and A. Carbonari, “A monitoring system for real-time interference control on large construction sites,” Automation in Construction, vol. 29, pp. 148–160, 2013. View at Publisher · View at Google Scholar · View at Scopus
  41. P. Najera, J. Lopez, and R. Roman, “Real-time location and inpatient care systems based on passive RFID,” Journal of Network and Computer Applications, vol. 34, no. 3, pp. 980–989, 2011. View at Publisher · View at Google Scholar · View at Scopus
  42. H.-F. Bai, T.-H. Yi, H.-N. Li, and L. Ren, “Multisensors on-site monitoring and characteristic analysis of UHV transmission tower,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 545148, 10 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  43. L. Ran, T. H. Yi, X. W. Ye, and X. B. Dong, “Long-term deformation monitoring of metro-tunnel airshaft excavation during construction stage,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 972893, 11 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  44. Q. Li, G. Li, and G. Wang, “Elasto-plastic bond mechanics of embedded fiber optic sensors in concrete under uniaxial tension with strain localization,” Smart Materials and Structures, vol. 12, no. 6, pp. 851–858, 2003. View at Publisher · View at Google Scholar · View at Scopus
  45. D. A. Norman, “Human-centered design considered harmful,” Interactions, vol. 12, no. 4, pp. 14–19, 2005. View at Google Scholar
  46. H. Jiang, P. Lin, M. Qiang, and Q. Fan, “A supervisor management and evaluation system based on real-time location system,” Applied Mechanics and Materials, vol. 538, pp. 198–205, 2014. View at Publisher · View at Google Scholar
  47. E. Sawacha, S. Naoum, and D. Fong, “Factors affecting safety performance on construction sites,” International Journal of Project Management, vol. 17, no. 5, pp. 309–315, 1999. View at Google Scholar · View at Scopus
  48. A. G. Vredenburgh, “Organizational safety: which management practices are most effective in reducing employee injury rates?” Journal of Safety Research, vol. 33, no. 2, pp. 259–276, 2002. View at Publisher · View at Google Scholar · View at Scopus
  49. S. R. Eddy, “Profile hidden Markov models,” Bioinformatics, vol. 14, no. 9, pp. 755–763, 1998. View at Publisher · View at Google Scholar · View at Scopus
  50. S. D. Eskesen, P. Tengborg, J. Kampmann, and T. Holst Veicherts, “Guidelines for tunnelling risk management: International Tunnelling Association, working group no. 2,” Tunnelling and Underground Space Technology, vol. 19, no. 3, pp. 217–237, 2004. View at Publisher · View at Google Scholar · View at Scopus
  51. S. Lan and Q. Zhang, “Risk assessment of deep excavation during construction based on fuzzy theory,” Chinese Journal of Geotechnical Engineering, vol. 31, no. 4, pp. 648–652, 2009. View at Google Scholar · View at Scopus
  52. P. Lin, X. Liu, Y. Hu, W. Xu, and Q. Li, “Deformation stability analysis of xiluodu arch dam under stress-seepage coupling condition,” Journal of Rock Mechanics and Engineering, vol. 32, no. 6, pp. 1137–1144, 2013. View at Google Scholar · View at Scopus
  53. P. Lin, S. Kang, Q. Li, R. Wang, and Z. Wang, “Evaluation of rock mass quality and stability analysis of Xiluodu arch dam under construction phase,” Chinese Journal of Rock Mechanics and Engineering, vol. 31, no. 10, pp. 2042–2052, 2012. View at Google Scholar · View at Scopus